Next-generation firewall products: Ready or not, here they come

Next-generation firewall products: Ready or not, here they come

Date: Sep 10, 2013

While many information security teams may be perfectly happy with the "old" firewall and its
role in the network security infrastructure, next-generation firewall products are here, ready or
not, and they offer a new world of advanced capabilities. As networks become more complex, these
products can effectively keep a network manageable and secure. However, it is crucial to ensure
that you are prepared for the expanded role a next-generation firewall (NGFW) plays.

In this video, network security expert David Strom discusses the distinguishing characteristics
of next-gen firewall products, such as application granularity and awareness, IP reputation
management, and integrated IPS. Additionally, Strom explores the various issues
you may encounter with NGFW deployments, such as out-of-date network documentation and the
misuse of existing firewalls in a network infrastructure. Finally, Strom discusses the pros and
cons of unified threat management (UTM) tools, since they are frequently mentioned alongside
NGFWs.

More on Network Security: Tools, Products, Software

VIDEO - This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.

There are Comments. Add yours.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.

Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.